9
Most read
10
Most read
11
Most read
HACKING GCP FOR FUN &
PROFIT
Security Engineer at BugBase
Pursuing MBBS
Part-time Bug bounty hunter
CyberSecurity Trainer & Mentor
eJPT, CRTP
Successfully Hacked and
Secured 150+ companies
AGNIBHA DUTTA
Y0GI
aka
WHOAMI?
Cloud Providers in Market
Introduction to Google Cloud Platform
GCP (Google Cloud Platform) is a suite of cloud computing services
provided by Google. It offers a wide range of services and tools for building,
deploying, and managing applications, as well as for storing and analyzing
data. GCP enables businesses, developers, and organizations to use
Google's infrastructure and resources for scalable and reliable cloud
solutions.
Granular Permissions: Assign specific permissions to different users for various
resources, enabling precise access control and enhancing security within the GCP
environment.
Centralized Management: Simplifies the administration of user permissions and access
policies across all GCP resources from a single platform, improving efficiency and
compliance.
Identity and Access Management (IAM) in GCP allows administrators to control who has
access to cloud resources, ensuring secure and precise management of permissions.
GCP IAM Basics
COMPUTE ENGINE
Virtual Machine Instances: Compute Engine provides scalable, high-performance (VM) instances that
can be customized to meet various requirements.
Integration with GCP Services: Seamlessly integrates with other GCP services such as Cloud Storage,
BigQuery, and Kubernetes Engine, enabling comprehensive solutions for various computing needs.
Service Account Integration: Compute Engine allows users to attach service accounts to VM
instances, granting them access to other Google Cloud services without requiring explicit
authentication, enhancing automation and seamless integration within GCP environments.
GCP STORAGE BUCKET
Storage Bucket is something similar to AWS S3 bucket and allows you to store files
Sometimes buckets can be misconfigured and be publicly exposed.
Let’s look at some Misconfigs !
GCP MISCONFIG
Adding principles like ‘allUsers’ or ‘allAuthenticatedUsers’
Misconfigured GCP Bucket Policy and Publicaly exposed
SSRF in GCP
Hacking GCP For Fun by Agnibha Dutta.pdf
IAM misconfig in GCP
Exposed Private Keys
Hacking GCP For Fun by Agnibha Dutta.pdf
Any Questions?
My Socials:
https://x.com/AnonY0gi
https://linkedin.com/in/y0gi
THANK YOU

More Related Content

PDF
Introduction to GCP
PPTX
Introduction to GCP presentation
PPTX
Google Cloud Study Jam | GDSC NCU
PPTX
GCP.pptx
PPTX
GDSC Study Jam Session 1
PPTX
GCCP-Session 2
PPTX
GCCP Session 2.pptx
PPTX
Introduction to Google Cloud & GCCP Campaign
Introduction to GCP
Introduction to GCP presentation
Google Cloud Study Jam | GDSC NCU
GCP.pptx
GDSC Study Jam Session 1
GCCP-Session 2
GCCP Session 2.pptx
Introduction to Google Cloud & GCCP Campaign

Similar to Hacking GCP For Fun by Agnibha Dutta.pdf (20)

PPTX
Cloud & GCP 101
PDF
Getting started with GCP ( Google Cloud Platform)
DOCX
Google Cloud Platform.docx
PPTX
GCCP Session.pptx
PDF
Introduction to gcp
PDF
Gcp intro-20160721
PPTX
Google developers consoles
PPTX
Harnessing the Power of Google Cloud Platform: Strategies and Applications
PPTX
Cloud Jam .pptx
PPTX
Google Cloud Platform (GCP)
PPTX
GDSC BVCOENM - Google Cloud Study Jam October 2021 | Day 1 + Day 2
PPTX
JAM23-24_ppt.pptx
PDF
GCP - GCE, Cloud SQL, Cloud Storage, BigQuery Basic Training
PDF
Buy Google Cloud Accounts Buy Google Cloud Accounts
PPTX
PDF
Introduction to Google Cloud Platform
PDF
What is Google Cloud Good For at DevFestInspire 2021
PDF
Google cloud platform Introduction - 2014
PDF
node.js on Google Compute Engine
PPTX
30 daysofcloud - 2
Cloud & GCP 101
Getting started with GCP ( Google Cloud Platform)
Google Cloud Platform.docx
GCCP Session.pptx
Introduction to gcp
Gcp intro-20160721
Google developers consoles
Harnessing the Power of Google Cloud Platform: Strategies and Applications
Cloud Jam .pptx
Google Cloud Platform (GCP)
GDSC BVCOENM - Google Cloud Study Jam October 2021 | Day 1 + Day 2
JAM23-24_ppt.pptx
GCP - GCE, Cloud SQL, Cloud Storage, BigQuery Basic Training
Buy Google Cloud Accounts Buy Google Cloud Accounts
Introduction to Google Cloud Platform
What is Google Cloud Good For at DevFestInspire 2021
Google cloud platform Introduction - 2014
node.js on Google Compute Engine
30 daysofcloud - 2

More from null - The Open Security Community (20)

PPTX
Rods and Hooks - The Phishing Trip by Soummya Mukhopadhyay
PPTX
Zero Trust in the Age of AI by Deblohit Bose.pptx
PDF
A Real-Life Journey into Exploiting Ticketing Systems.pdf
PPTX
Active Directory Delegation Attacks by Syed Modassir Ali
PPTX
How Python Empowers Ethical Hackers by Supriya Kumar Mitra
PDF
Mission Impossible - Malware Analysis.pdf
PDF
Infiltrating the Supply Chain Attack: Advanced Payload Delivery and Evasion T...
PPTX
Docker Decoded : From Basics to Breaches _Rakesh Seal
PDF
Breach and Attack Simulation by Danish Amber.pdf
PDF
uart_shell_in_a_router_Debanjan_Saha.pdf
PPTX
Intro To SIGNT_Soummya Mukhopadhyay.pptx
PDF
LLM_Security_Arjun_Ghosal_&_Sneharghya.pdf
PPTX
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
PPTX
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
PPTX
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
PPTX
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
PDF
Hardware-Hacking-101 By Asutosh Kumar.pdf
PDF
Demystifying-DNS-Attack-by-Rakesh Seal.pdf
PDF
Immutable Desktop using Container Orchestration By Mohammed Danish Amber .pdf
PDF
Recon for Bug Bounty by Agnibha Dutta.pdf
Rods and Hooks - The Phishing Trip by Soummya Mukhopadhyay
Zero Trust in the Age of AI by Deblohit Bose.pptx
A Real-Life Journey into Exploiting Ticketing Systems.pdf
Active Directory Delegation Attacks by Syed Modassir Ali
How Python Empowers Ethical Hackers by Supriya Kumar Mitra
Mission Impossible - Malware Analysis.pdf
Infiltrating the Supply Chain Attack: Advanced Payload Delivery and Evasion T...
Docker Decoded : From Basics to Breaches _Rakesh Seal
Breach and Attack Simulation by Danish Amber.pdf
uart_shell_in_a_router_Debanjan_Saha.pdf
Intro To SIGNT_Soummya Mukhopadhyay.pptx
LLM_Security_Arjun_Ghosal_&_Sneharghya.pdf
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Hardware-Hacking-101 By Asutosh Kumar.pdf
Demystifying-DNS-Attack-by-Rakesh Seal.pdf
Immutable Desktop using Container Orchestration By Mohammed Danish Amber .pdf
Recon for Bug Bounty by Agnibha Dutta.pdf

Recently uploaded (20)

PDF
August -2025_Top10 Read_Articles_ijait.pdf
PDF
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
PDF
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PDF
Introduction to Power System StabilityPS
PDF
Computer System Architecture 3rd Edition-M Morris Mano.pdf
PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PDF
Computer organization and architecuture Digital Notes....pdf
PPTX
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
PPTX
PRASUNET_20240614003_231416_0000[1].pptx
PDF
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
PPTX
Module 8- Technological and Communication Skills.pptx
PPTX
ai_satellite_crop_management_20250815030350.pptx
DOC
T Pandian CV Madurai pandi kokkaf illaya
PPT
Chapter 1 - Introduction to Manufacturing Technology_2.ppt
PPTX
CyberSecurity Mobile and Wireless Devices
PDF
Design of Material Handling Equipment Lecture Note
PDF
First part_B-Image Processing - 1 of 2).pdf
PPTX
Petroleum Refining & Petrochemicals.pptx
August -2025_Top10 Read_Articles_ijait.pdf
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
"Array and Linked List in Data Structures with Types, Operations, Implementat...
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
Introduction to Power System StabilityPS
Computer System Architecture 3rd Edition-M Morris Mano.pdf
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
Computer organization and architecuture Digital Notes....pdf
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
PRASUNET_20240614003_231416_0000[1].pptx
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
Module 8- Technological and Communication Skills.pptx
ai_satellite_crop_management_20250815030350.pptx
T Pandian CV Madurai pandi kokkaf illaya
Chapter 1 - Introduction to Manufacturing Technology_2.ppt
CyberSecurity Mobile and Wireless Devices
Design of Material Handling Equipment Lecture Note
First part_B-Image Processing - 1 of 2).pdf
Petroleum Refining & Petrochemicals.pptx

Hacking GCP For Fun by Agnibha Dutta.pdf

  • 1. HACKING GCP FOR FUN & PROFIT
  • 2. Security Engineer at BugBase Pursuing MBBS Part-time Bug bounty hunter CyberSecurity Trainer & Mentor eJPT, CRTP Successfully Hacked and Secured 150+ companies AGNIBHA DUTTA Y0GI aka WHOAMI?
  • 4. Introduction to Google Cloud Platform GCP (Google Cloud Platform) is a suite of cloud computing services provided by Google. It offers a wide range of services and tools for building, deploying, and managing applications, as well as for storing and analyzing data. GCP enables businesses, developers, and organizations to use Google's infrastructure and resources for scalable and reliable cloud solutions.
  • 5. Granular Permissions: Assign specific permissions to different users for various resources, enabling precise access control and enhancing security within the GCP environment. Centralized Management: Simplifies the administration of user permissions and access policies across all GCP resources from a single platform, improving efficiency and compliance. Identity and Access Management (IAM) in GCP allows administrators to control who has access to cloud resources, ensuring secure and precise management of permissions. GCP IAM Basics
  • 6. COMPUTE ENGINE Virtual Machine Instances: Compute Engine provides scalable, high-performance (VM) instances that can be customized to meet various requirements. Integration with GCP Services: Seamlessly integrates with other GCP services such as Cloud Storage, BigQuery, and Kubernetes Engine, enabling comprehensive solutions for various computing needs. Service Account Integration: Compute Engine allows users to attach service accounts to VM instances, granting them access to other Google Cloud services without requiring explicit authentication, enhancing automation and seamless integration within GCP environments.
  • 7. GCP STORAGE BUCKET Storage Bucket is something similar to AWS S3 bucket and allows you to store files Sometimes buckets can be misconfigured and be publicly exposed.
  • 8. Let’s look at some Misconfigs !
  • 9. GCP MISCONFIG Adding principles like ‘allUsers’ or ‘allAuthenticatedUsers’ Misconfigured GCP Bucket Policy and Publicaly exposed